Sciweavers

2081 search results - page 317 / 417
» codes 2006
Sort
View
134
Voted
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 4 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
113
Voted
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 4 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
94
Voted
MSR
2006
ACM
15 years 4 months ago
Mining large software compilations over time: another perspective of software evolution
With the success of libre (free, open source) software, a new type of software compilation has become increasingly common. Such compilations, often referred to as ‘distributions...
Gregorio Robles, Jesús M. González-B...
93
Voted
PLDI
2006
ACM
15 years 4 months ago
Automatic instruction scheduler retargeting by reverse-engineering
In order to generate high-quality code for modern processors, a compiler must aggressively schedule instructions, maximizing resource utilization for execution efficiency. For a ...
Matthew J. Bridges, Neil Vachharajani, Guilherme O...
99
Voted
PLDI
2006
ACM
15 years 4 months ago
SAFECode: enforcing alias analysis for weakly typed languages
Static analysis of programs in weakly typed languages such as C and C++ is generally not sound because of possible memory errors due to dangling pointer references, uninitialized ...
Dinakar Dhurjati, Sumant Kowshik, Vikram S. Adve